![]() | ![]() |
2008 | ||
---|---|---|
19 | EE | Zuhua Shao: Fair exchange protocol of signatures based on aggregate signatures. Computer Communications 31(10): 1961-1969 (2008) |
18 | EE | Zuhua Shao: Certificate-based fair exchange protocol of signatures from pairings. Computer Networks 52(16): 3075-3084 (2008) |
17 | EE | Zuhua Shao: Certificate-based verifiably encrypted signatures from pairings. Inf. Sci. 178(10): 2360-2373 (2008) |
2007 | ||
16 | EE | Zuhua Shao: On the Sequentiality of Three Optimal Structured Multisignature Schemes. ISPEC 2007: 105-115 |
15 | EE | Zuhua Shao: Self-certified Signatures Based on Discrete Logarithms. WAIFI 2007: 252-263 |
14 | EE | Zuhua Shao: A provably secure short signature scheme based on discrete logarithms. Inf. Sci. 177(23): 5432-5440 (2007) |
13 | EE | Zuhua Shao: Self-certified signature scheme from pairings. Journal of Systems and Software 80(3): 388-395 (2007) |
2006 | ||
12 | EE | Zuhua Shao: Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys. Informatica, Lith. Acad. Sci. 17(4): 577-586 (2006) |
11 | EE | Zuhua Shao: Security of the design of time-stamped signatures. J. Comput. Syst. Sci. 72(4): 690-705 (2006) |
2005 | ||
10 | EE | Zuhua Shao: Enhanced Aggregate Signatures from Pairings. CISC 2005: 140-149 |
9 | EE | Zuhua Shao: Short Signature Scheme Based on Discrete Logarithms. WAIM 2005: 645-650 |
8 | EE | Zuhua Shao: A new key authentication scheme for cryptosystems based on discrete logarithms. Applied Mathematics and Computation 167(1): 143-152 (2005) |
7 | EE | Zuhua Shao: Improvement of efficient proxy signature schemes using self-certified public keys. Applied Mathematics and Computation 168(1): 222-234 (2005) |
6 | EE | Zuhua Shao: Security of meta-He digital signature scheme based on factoring and discrete logarithms. Applied Mathematics and Computation 170(2): 976-984 (2005) |
5 | EE | Zuhua Shao: Cryptanalysis of Xia-You group signature scheme. Journal of Systems and Software 75(1-2): 89-94 (2005) |
2004 | ||
4 | EE | Zuhua Shao: Improvement of digital signature with message recovery using self-certified public keys and its variants. Applied Mathematics and Computation 159(2): 391-399 (2004) |
2003 | ||
3 | EE | Zuhua Shao: Proxy signature schemes based on factoring. Inf. Process. Lett. 85(3): 137-143 (2003) |
2 | EE | Zuhua Shao: Cryptanalysis of "an identity-based society oriented signature scheme with anonymous signers". Inf. Process. Lett. 86(6): 295-298 (2003) |
2001 | ||
1 | EE | Zuhua Shao: Batch verifying multiple DSA-type digital signatures. Computer Networks 37(3/4): 383-389 (2001) |